News

Vice President & Principal Analyst, Enterprise Data Technologies, Robert Kramer explains what MongoDB's new Queryable Encryption is and why it is such a breakthrough.
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection ...
Atlassian recently published how it performs Application Level Encryption at scale on AWS while utilising high cache hit rates and maintaining low costs. Atlassian's solution runs over 12,500 ...
Paul Smith-Goodson explores the end-to-end features and capabilities of IBM Quantum Safe Technology and examines its usefulness in identifying non-quantum-safe encryption and replacing them with ...
Agencies seeking to protect their data in motion or at rest often use different encryption strategies, many of which are managed by application owners and database administrators across the ...
Signal is finally tightening its desktop client's security by changing how it stores plain text encryption keys for the data store after downplaying the issue since 2018.
As governments and others increasingly seek the keys from your vendors to unlock your encrypted data, you should consider using self-provisioned keys ...
Scientists at Princeton have discovered a way to grab otherwise-protected data encryption keys from memory on a computer that's just been powered down.
The difference between them is simple, and concerns who holds a key with the ability to decrypt the data. For iCloud data: Weak encryption: Your devices + Apple Strong encryption: Your devices only ...
Researchers from ERPScan said SAP’s HANA in-memory database contains a default static encryption key.
The database key was never intended to be a secret. At-rest encryption is not something that Signal Desktop is currently trying to provide or has ever claimed to provide.